The FCC has proposed new rules that could streamline and expand the nation’s Emergency Alert System, but one commissioner calls the proposed changes a power grab to expand the commission’s authority to the Internet.
Malware for stealing out-of-band passwords for two-factor authentication demonstrates the need to maintain good security on mobile devices.
A sophisticated campaign using SQL Injection for Search Engine Optimization has been spotted by Akamai’s Threat Research Division, raising some questions about what is legitimate and what is proper.
A new multi-institutional project funded by NSF aims to bring software development from an art to a science, using formal logic and precise specifications for program behavior to create software that is verifiably reliable.
Predicting things is easy. Here are my predictions for 2016 on cyber insurance, the Internet of Things, continuous monitoring and passwords.
As the nation shifts to IP-based landline telephone service or cuts the cord to go mobile, carriers, consumers and regulators face a host of challenges in providing services we take for granted.
Despite legal victories against organized criminals who encrypt and hold computers for ransom, new malicious campaigns continue to crop up. The Senate Homeland Security and Governmental Affairs Committee is seeking information from DHS and the DOJ on the extent of the problem…
NIST is mulling over removing entropy requirements for passwords from its security guidelines. There really is no good way to measure how strong a password is, anyway.
This is a test of the Excerpt field. Treating the nationwide healthcare IT system as a critical infrastructure is a sensible requirement for a system that touches so many lives so closely.
October 1 was the deadline for a shift in payment card fraud liability that marks a major effort to boost U.S. adoption of smarter credit and debit cards.
October 1 was the deadline for a shift in liability for merchants who accept credit…